PT-2026-39902 · Go · Github.Com/Safedep/Gryph

Published

2026-05-11

·

Updated

2026-05-11

·

CVE-2026-45046

CVSS v3.1

5.5

Medium

VectorAV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Gryph implements logging levels that determine what content is logged to a local sqlite database. The README incorrectly mentions that the default log level is minimal while it is standard. Source code review shows sensitive file-write content remains in the stored payload as ContentPreview, OldString, or NewString at the default standard logging level and at full. This leads to logging of potentially sensitive file content in the local sqlite database, violating Gryphs sensitive file filter and log level contracts.

Impact

Potentially sensitive data accessed or written by coding agents may be logged to local sqlite database. Users of Gryph are affected ONLY if their local sqlite database is stolen or exported to remote system with the assumption that no sensitive data is logged.

Patches

Fixed in v0.7.0

Fix

Weakness Enumeration

Related Identifiers

CVE-2026-45046
GHSA-F3JG-756W-GM35

Affected Products

Github.Com/Safedep/Gryph